Insider Threat Detection: Host and Network Monitoring Techniques